Packet Analyzer and Stealth Watch Video

Submit Audition/Proposal on this Project
Rate this Project

Project Main Details

Packet Analyzer and Stealth Watch Video 
This is a buyout for an explainer video, describing how two security softwares work together. The narration will accompany an animated video, showing the benefits of the products used together. This video will live online and is not for broadcast. Tone should be informative, but conversational. 
2017-01-09 19:19:05 GMT
2017-01-19 10:00:00 (GMT -08:00) Pacific Time (US & Canada) 
Yes (click here to learn more about Voice123's SmartCast)
0 direct invitation(s) have been sent by the voice seeker resulting in 0 audition(s) and/or proposal(s) so far.
Voice123 SmartCast is seeking 40 auditions and/or proposals for this project (approx.) Invitations sent by SmartCast have resulted in 39 audition(s) and/or proposal(s) so far.

Project Parameters

The Voice Actor should be located in:
Fixed - USD 400
Training, business presentations, sales, and web sites
English - USA and Canada
Not defined
Young Adult Female OR Young Adult Male OR Middle Age Female OR Middle Age Male
• Phone Patch AND
Source Connect AND
• Audio files must be delivered via email AND
• Audio files must be delivered via FTP/Dropbox/Google Drive/cloud
There are no special pre-, post-, or production requirements for this project.
Not defined
This is a non-union project

Script Details

Statistics show that a typical security event goes undetected for 100 days or more, putting at risk large amounts of critical IP, personnel data or account information.

A number of these threats come from “out there” with bad actors constantly trying to find soft spots in your defenses.

But even if your perimeter is secure, some threats can exist within your network. Whether it’s a disgruntled employee, a found device, or unsecured login information, authorized activity can still pose a threat to your network and, by extension, your business.
These internal threats are dangerous because they are difficult to detect and investigate.
The good news is, Cisco Stealthwatch combined with the CiscoSecurity Packet Analyzer can increase your ability to quickly and accurately detect threats, amplify network forensics, and accelerates the resolution of security investigations.

By combining the threat detection capabilities of Stealthwatch with the ability to view and analyze telemetry data associated with the event using Security Packet Analyzer, you can fine tune detection, improve response time, and enhance investigations without adding more overhead for security teams.
Here’s how it works.
Say a known device starts gathering a large amount of data from your servers.

Stealthwatch can highlight this behavior as abnormal for that device.

Since this activity is characteristic of data hoarding, Stealthwatch sends an alert to a security analyst who, upon closer examination of this device, can determine that data has also been moved to a cloud storage service.

From the Stealthwatch console, the analyst can build custom queries, filter, and isolate the contents of just the suspicious packets from the Security Packet Analyzer.
This allows the analyst to then investigate packets, determine the severity of the security incident, and act accordingly.
While most IT organizations might rely on netflow or packet capture, few use both of these types of tools...

…the combination of Stealthwatch and Security Packet Analyzer provides a streamlined, accelerated, single pane of glass solution.

This holistic approach to security improves visibility and control over your network’s dataflow, allowing you to detect, investigate, and mitigate threats quickly with the help of targeted analysis. This makes it easier to see anomalies and quickly find the packets you need to reach a resolution, improving the integrity of your data, the effectiveness of your security, and the reputation of your business.
Contact your Cisco account team to schedule a demo today or learn more about our offerings at 
Please note that you should only use the script or your recording of it for auditioning purposes. The script is property, unless otherwise specified, of the voice seeker and it is protected by international copyright laws.

Voice-Seeker Details

Sign in to display the company name (if applicable)


Voice123 Team Comments

Voice123 consultations with this voice seeker regarding this project and/or other projects by this voice seeker, via phone, chat, and/or email.

unchecked This project - phone.

unchecked Previous projects - phone.

unchecked This project - email or chat.

checked Previous projects - email or chat.

Note: Voice123 strives to establish the legitimacy of all projects posted. However, Voice123 subscribers and users are responsible for confirming information stated by prospective voice seekers, agents and/or clients. Voice123 subscribers and users assume all liability for use of any information found through Voice123, or any of its publications.

This page contains the most important details of this project. If you find the information on this project inaccurate or inappropriate, please let us know by contacting us.

Submit Audition/Proposal on this Project